Friday 28 March 2025, 10am - 2pm Zurich
Friday 28 March 2025, 10am - 2pm Zurich
Zero
Trust Roundtable
Zero
Trust Roundtable
The critical role of certificate management in digital identity security programs
The critical role of certificate management in digital identity security programs



About the event
About the event
About the event
Learn about strategies and tools to defend your company against the growing threat of attacks leveraging machine identities.
We meet in a confidential setting, following the Chatham House Rule, which means you are welcome to use and share information about what you learn but not who told you and where they work. This enables an open exchange of valuable insights.
Learn about strategies and tools to defend your company against the growing threat of attacks leveraging machine identities.
We meet in a confidential setting, following the Chatham House Rule, which means you are welcome to use and share information about what you learn but not who told you and where they work. This enables an open exchange of valuable insights.
Learn about strategies and tools to defend your company against the growing threat of attacks leveraging machine identities.
We meet in a confidential setting, following the Chatham House Rule, which means you are welcome to use and share information about what you learn but not who told you and where they work. This enables an open exchange of valuable insights.






Learn from peers!
The event is headlined by industry experts and innovators shaping trends and driving product developement in the certificate and identity security space.
The event is headlined by industry experts and innovators shaping trends and driving product developement in the certificate and identity security space.
The event is headlined by industry experts and innovators shaping trends and driving product developement in the certificate and identity security space.
Tomislav Ljubas
Tomislav Ljubas
Tomislav Ljubas
Managing Director Corporate IT & Security at ISS-Stoxx (Deutsche Börse Group)
March 28, 2025
10:00 AM - 10:30 AM
10:00 AM - 10:30 AM
10:00 AM - 10:30 AM
Matt Barker
Matt Barker
Matt Barker
VP & Global Head of Workload Identity Architecture at Venafi/ CyberArk
March 28, 2025
10:40 AM - 11:00 AM
10:40 AM - 11:00 AM
10:40 AM - 11:00 AM
Schedule
Explore the complete event schedule to find out about sessions, speakers, and activities.
28 March
2025
2025
Zero Trust & Certificate Management
Welcome Coffee & Networking
09:00 AM - 10:00 AM

New Environments, New Identities, New Threats
10:00 AM - 10:20 AM
We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

New Environments, New Identities, New Threats
10:00 AM - 10:20 AM
We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

New Environments, New Identities, New Threats
10:00 AM - 10:20 AM
We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

1st Roundtable Discussion
10:20 AM - 10:40 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

1st Roundtable Discussion
10:20 AM - 10:40 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

1st Roundtable Discussion
10:20 AM - 10:40 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

A path to extend the Digital Identity Security Platform
10:40 AM - 11:00 AM
Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

A path to extend the Digital Identity Security Platform
10:40 AM - 11:00 AM
Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

A path to extend the Digital Identity Security Platform
10:40 AM - 11:00 AM
Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

2nd Roundtable Discussion
11:00 AM - 11:20 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

2nd Roundtable Discussion
11:00 AM - 11:20 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

2nd Roundtable Discussion
11:00 AM - 11:20 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Implementing Certificate Management - Lessons Learned
11:20 AM - 11:40 AM
As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

Implementing Certificate Management - Lessons Learned
11:20 AM - 11:40 AM
As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

Implementing Certificate Management - Lessons Learned
11:20 AM - 11:40 AM
As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

3rd Roundtable Discussion
11:40 AM - 12:00 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

3rd Roundtable Discussion
11:40 AM - 12:00 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

3rd Roundtable Discussion
11:40 AM - 12:00 AM
Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels
Lunch Break & Networking
12:00 PM - 14:00 PM
Questions & Answers
Can’t find the answer you’re looking for?
1. Is there a registration fee?
The event is 100% free, guests will have to pay for travel and accommodation themselves though.
2. How do I know my registration was successful?
Our team will reach out by email and confirm your attendance. We will also inquire about special dietary requirements.
3. Are there opportunities to meet with participants and speakers after the event?
Yes, you are welcome to join our speakers and other participants for lunch after the event and to stick around until evening to continue the conversations!
4. Can I suggest topics to be covered during the event?
Yes, please email us and we will address your questions at the event! Alternatively you can raise topics during the roundtable part of the event and we encourage you do so!
5. Who sponsors the event?
The event is organised by IT District AG with the support of CyberArk
6. Are there any accommodation options near the event venue?
Yes, The Circle is a hotel and office complex just opposite Zurich Airport with plenty of hotel options.
1. Is there a registration fee?
The event is 100% free, guests will have to pay for travel and accommodation themselves though.
2. How do I know my registration was successful?
Our team will reach out by email and confirm your attendance. We will also inquire about special dietary requirements.
3. Are there opportunities to meet with participants and speakers after the event?
Yes, you are welcome to join our speakers and other participants for lunch after the event and to stick around until evening to continue the conversations!
4. Can I suggest topics to be covered during the event?
Yes, please email us and we will address your questions at the event! Alternatively you can raise topics during the roundtable part of the event and we encourage you do so!
5. Who sponsors the event?
The event is organised by IT District AG with the support of CyberArk
6. Are there any accommodation options near the event venue?
Yes, The Circle is a hotel and office complex just opposite Zurich Airport with plenty of hotel options.
1. Is there a registration fee?
The event is 100% free, guests will have to pay for travel and accommodation themselves though.
2. How do I know my registration was successful?
Our team will reach out by email and confirm your attendance. We will also inquire about special dietary requirements.
3. Are there opportunities to meet with participants and speakers after the event?
Yes, you are welcome to join our speakers and other participants for lunch after the event and to stick around until evening to continue the conversations!
4. Can I suggest topics to be covered during the event?
Yes, please email us and we will address your questions at the event! Alternatively you can raise topics during the roundtable part of the event and we encourage you do so!
5. Who sponsors the event?
The event is organised by IT District AG with the support of CyberArk
6. Are there any accommodation options near the event venue?
Yes, The Circle is a hotel and office complex just opposite Zurich Airport with plenty of hotel options.
Join us in Zurich!
Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Join us in Zurich!
Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Join us in Zurich!
Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.
